The Access Shield solution was developed using the Software Definer Perimeter (SDP) concept to protect application hosted in public/private cloud, on premise or in data center. This solution protects your application against main threats to your business (like network attacks, identity thefts, malicious code exploitation, DDoS, others).
The least privilege principle, well know in computing field (especially in information security), defines each actor (user, process or application) must only have access to the necessary resources to execute their activities.
Local or remote users need access to internal business applications to perform daily activities. However, companies rely on tools and solutions that ensure excessive privilege and visibility to users, besides being expensive and hard to deploy.
With our SDP model, it’s possible to provide the necessary privilege to each user to execute their activities, ensuring the least privilege principle.
Software Defined Perimeter
The Software Defined Perimeter concept comes from a CSA’s (Cloud Security Alliance) initiative to find a efficient way to stop network attacks. The SDP model uses a Defense Information Systems Agency’s (DISA) concept as base to the “need-to-know” principle to manage access and connections. CSA defines this model as “on-demand, dynamically-provisioned, air gapped networks”.
How it works
The Access Shield solution provides a new approach to solve challenges by hiding and isolating the application, and creating a dynamic perimeter that allow the company to define who can access its systems and applications.
The dynamic shape of the solution allows it to adapt to network changes by providing greater agility to the organization and improves the user experience whilst deploys the main security controls transparently.
As the image shows, the Access Shield solution changes the order of access to services – the user needs to be authenticated and authorized to then be able to connect to the application or system.
Request a trial
Are you ready to test the access control next generation? Contact us and request a trial of this new model.